8/Ques ons and answers 2026
Each of the following is a reason why it is difficult to defend against today's a ackers except
_____.
a. speed of a acks
b. greater sophis ca on of a acks
c. complexity of a ack tools
d. delays in patching hardware and so ware products
C. Complexity of a ack tools.
In a general sense, "security" is _______.
a. protec on from only direct ac ons
b. using reverse a ack vectors (RAV) for protec on
c. only available on hardened computers and systems
d. the necessary steps to protect a person or property from harm
the necessary steps to protect a person or property from harm
_____ ensures that only authorized par es can view the informa on.
a. Availability
b. Integrity
c. Confiden ality
d. ICA
C. Confiden ality
Each of the following is a successive layer in which informa on security is achieved except
_______.
a. products
b. purposes
c. procedures
d. people
,b. Purposes
By defini on, a(n) _______ is a person or thing that has the power to carry out a threat.
threat agent
_______ensures that the individual is who they claim to be.
Authen ca on
Each of the following is a goal of informa on security except _____.
a. prevent data
b. decrease user produc vity
c. avoid legal consequences
d. foil cyberterrorism
B. Decrease user produc vity
The ______ requires that enterprises must guard protected health informa on and implement
policies and procedures to safeguard it.
Health Insurance Portability and Accountability Act (HIPAA)
U lity, telecommunica ons, and finanical services companies are considered prime targets of
_____ because a ackers can significantly disrupt business and personal ac vites by destroying a
few targets.
a. cyberterrorists
b. kiddie scripters
c. computer spies
d. blue hat hackers (BHH)
a. cyberterrorists
A er an a acker probed a computer or network for informa on she would next _____.
a. modify security se3ngs
b. penetrate any defenses
c. paralyze networks and devices
d. circulate to other systems
b. penetrate any defenses
,An organiza on that purchased security products from different vendors in case an a acker
circumvented the Brand A device, yet would have more difficulty trying to break through a
Brand B device because they are different, is an example of _____.
a. obscurity
b. layering
c. limi ng
d. diversity
D. Diversity
Each of the following can be classified as an "insider" except _______.
a. business partners
b. contractors
c. cybercriminals
d. employees
Cybercriminals
________ are a network of a ackers, iden ty thieves, and financial fraudsters.
Cybercriminals
Each of the following is a characteris c of cybercriminals except _____.
a. low mo va on
b. less risk-averse
c. be er funded
d. more tenacious
a. low mo va on
Each of the following is a characteris c of cybercrime except _____.
a. targeted a acks against financial networks.
b. unauthorized access to informa on
c. the of personal informa on
d. exclusive use of worms and viruses
D. Exclusive use of worms & viruses
, An example of a(n) _____ is a so ware defect in an opera ng system that allows an
unauthorized user to gain access to a computer without a password.
a. vulnerability
b. threat
c. threat agent
d. asset exploit (AE)
A. vulnerability
_____ requires banks and financial ins tu ons to alert customers of their policies & prac ces in
disclosing customer informa on & to protect all electronic & paper containing personally
iden fiable financial informa on
a. California Savings & Loan Security Act (CS&LSA)
b. USA Patriot Act
c. Sabanes-Oxley Act (Sarbox)
d. Gramm-Leach-Bliley Act (GLBA)
d. Gramm-Leach-Bliley Act (GLBA)
The term ____ is commonly used in a generic sense to iden fy anyone who illegally breaks into
a computer system.
a. hacker
b. cyberterrorist
c. Internet Exploiter
d. cyberrogue
a. hacker
An example of _____ would be not revealing the type of computer, opera ng system, so ware,
& network connec on a computer uses.
a. diversity
b. Iimi ng
c. obscurity
d. layering
c. obscurity